Cisco ccna simplified by paul browning pdf. Free Download e-Books Both. Surface2 and Surface Pro 2 are on display. sys 9 23 7 03 PM Editorial Reviews. About the Author. Paul Browning (LLB[Hons], CCNP, MCSE, A+, and Network+) spent 12 years as a police officer in Coventry and. Cisco CCNA Simplified [Paul W. Browning] on soundofheaven.info *FREE* shipping on qualifying offers. Cisco CCNA Simplified is a theory and lab manual combined.
|Language:||English, Spanish, Arabic|
|Genre:||Health & Fitness|
|ePub File Size:||30.39 MB|
|PDF File Size:||18.33 MB|
|Distribution:||Free* [*Regsitration Required]|
Cisco CCNA Simplified, 4th Edition_2 - Ebook download as PDF File .pdf), Text File .txt) or read book online. Cisco CCNA Simplified, 4th Edition_2. Read Cisco CCNA Simplified PDF - Your Complete Guide to Passing the Cisco CCNA Routing and Switching Exam by Paul W Browning Lasso. paul browning simplified by pdf Cisco ccna simplified by. Cisco CCNA Simplified: Workbook and Lab Guide soundofheaven.info, soundofheaven.info, soundofheaven.info
This process is known as a three-way handshake. As far as I can tell, nothing has been left to chance. SSH is often used for remote command executions. In the output below. Ramon Nastase.
Troubleshooting Technet Hands-on Labs 4. We will cover IP addressing and related topics in greater detail later in this book. This guide goes further than any other guide on the market I have seen by addressing troubleshooting skills and guiding you through every step of the configuration. Use a router emulator 1.
At the time of writing this guide. A big change to the latest CCNA exam is the introduction of troubleshooting. Cisco does not specify the model of the router but the IOS version is How would you like an operation to be performed on you by a surgeon who had learned how to operate only from books and exam cheat sources?
Check the Cisco. As you progress through the book. Hands-on experience is crucial to your success in the exam and your credibility as a CCNA. Buy a home study rack The first is the best option. To this end. You have four options in attaining the crucial hands-on exposure needed to pass the practical part of the CCNA exam: You need to understand troubleshooting methodologies tactics and be able to answer questions about the most likely cause of an issue given a set of facts.
You may also be asked to log in to network equipment and use show commands to determine the cause of a fault. Use a router simulator 4. Use the real equipment. You should invest in at least three routers and two switches.
Buy a home study rack 2. Rent online router time 3. The only exception is Packet Tracer. As other options have become available. Rent online router time Online rack time can be a little tricky. This has been developed into a robust solution for companies and individuals to study for exams or do testing. Just ask the seller which version is installed because many sellers have a contract with Cisco to add whichever version they need.
You also have to rent large chunks of time because if you are taking the actual CCIE exam. This often causes confusion to students trying to complete labs configured on live equipment. Cisco Systems offers a virtual rack solution that you can rent by the hour. Packet Tracer is officially available only to Cisco Network Academy students. The most accessible solution is free and provided by www. So many students buy several IT guides. If I used a fixed topology in this guide.
Other Resources There are many other study websites and. This has happened to me and other IT colleagues so I wanted to prevent this from happening to you. I strongly recommend mixing things up a bit once you get used to doing a few labs. The simplest network you can build is a few PCs connected to a hub. We will cover some of the basics in this book. A computer network can be as small as two computers connected by a single cable or wirelessly to the largest network in the world—the Internet.
A hub simply allows several networking devices to communicate. This causes a lot of unnecessary traffic to pass through the network see Figure 1. To connect a large number of PCs. Cisco expects you to have a good working knowledge of general networking. Hubs have no memory or hard drive so they can never remember which device is plugged into which port.
When a hub receives data on one port. Each device plugs into a port on the hub using a network cable more on these cables later. Hub The most rudimentary piece of networking equipment is a hub.
Hubs are fairly rare nowadays. If a PC wants to send data to another PC via a switch. Switches operate by building a list of which PCs are connected to which ports. As you can imagine. A data frame sent to every device on a network segment at the same time is referred to as a broadcast.
A high amount of broadcasts causes an enormous amount of traffic to traverse the network at any one time. Every time a PC receives this information. FIG 1. Too many broadcasts in a network can cause delays and dramatically reduce performance. Switches and hubs are designed to forward broadcast traffic as data frames addressed to every device in the network.
The collision causes the data inside the frame to become corrupted. Figure 1. A collision domain consists of an area in the network that a data frame will reach if there is a collision. This corrupted frame is received by every device within the collision domain.
If you ever see a hub in a network diagram referring to collision and broadcast domains. In earlier implementations of Ethernet. Smaller collision domains mean that traffic will move faster throughout the network. A collision occurs when a data frame. All the devices would still be in the same broadcast domain though. More VLANs equal more broadcast domains. Cisco Systems offers a large range of network switches to service small offices all the way up to large service providers.
It would be well worth your time to visit Cisco. A bridge is similar to a switch. Modern network standards have all but eliminated collisions in the network. Figures 1. A switch is basically a multiport bridge.
Every port on the switch is a separate collision domain. This path could be the fastest. If the router does not know how to get traffic to its intended destination. Router A router is designed to store a directory of networks.. Most can store frames in buffer memory.
Broadcasts in the network will stop at the router unless you configure it to forward them. Switches offer another advantage over hubs. For the exam remember that switches segment collision domains. If they did. Rather than concerning itself with which PC is where. It is important to remember that by default. Also remember that routers segment broadcast domains. Each user receives instant access to the full bandwidth and therefore does not have to contend for available bandwidth with other users.
The outcome is that collisions commonplace when using hubs no longer occur provided you are using full-duplex. It then sends the traffic via the best path. Microsegmentation creates dedicated network segments i. The physical layer is always known as layer 1 and so on. This model was named the Open Systems Interconnection model. The ISO created a model for every company to follow when designing networking hardware and software.
We always refer to the model in the order below. There must be some way to order things so we know which devices do which job. What if your company wants to buy switches from a different vendor than the one they buy their routers from?
How can it be sure the equipment will work together? Advantages of using the OSI model include the following: The OSI model not only serves as a reference. Application layer 7 Presentation layer 6 Session layer 5 Transport layer 4 Network layer 3 Data link layer 2 Physical layer 1 The application layer is also known as layer 7.
This is necessary because each layer requires a different set of information and addressing to work properly. As data is encapsulated while moving down the layers. As shown in Figure 1. When the data is received at the destination. Encapsulation As data passes down each OSI layer. The header contains information on how the data should be treated by the receiver. An easy way to see the division of the various layers is by examining a packet capture from software such as Wireshark.
Any exam question that refers to a data frame or packet and asks which OSI layer it applies to can be easily answered if you remember the acronym for the five steps of data encapsulation above. We will be looking at packet captures throughout this guide.
Some of them include: World Wide Web WWW — connects millions of users to servers and provides multimedia functions such as text. There are many services that operate at the application layer. POP — the standard used to send and receive e-mail all over the world File Transfer Protocol FTP — provides a means to upload and download large files over networks imagine having to e-mail a colleague a 20 Mb file!
Telnet — used to connect to networking devices remotely many network Technet It establishes whether the destination is available to communicate and determines whether sufficient resources are available to do so.
It is also responsible for data encryption. The answer would be that you could telnet or FTP to another host. Presentation Layer The function of the presentation layer is to present data to the application layer. Some of the protocols that operate at the session layer include: It converts coded data into a format the application layer can understand.
The presentation layer converts many multimedia functions for the application layer. Session Layer In the session layer. Bitmap BMP. TCP is considered a reliable connection-oriented protocol. The handshake can be seen if the packets on the wire are read and can be identified by fields in the packet marked as SYN.
Many application layer protocols use TCP as the transport protocol. We will also touch on this Technet In TCP. Before communication can take place. Some of them include Telnet. It also has flow control and congestion avoidance mechanisms to ensure that data gets to its destination safely. It uses reliable mechanisms to initiate and terminate connections. The transport layer includes several protocols.
This process is known as a three-way handshake. The transport layer takes data from the upper layers. Flow control 2. This means that there is a guarantee that the data sent will reach the intended destination. Windowing 3. This is accomplished by using three methods: Windowing The TCP window is the amount of data that can be sent before an acknowledgment is required from the receiver.
The packet sent to stop the sender is known as a source quench message.. If the receiver is sent more information than it can process. If a sender does not receive acknowledgments for the segments sent after a certain period. The sender and receiver agree on the window size and this can be scaled up and down as required. An example of when this can occur is when both sides are using different speeds e. You can see the routing table for Router B in Table above.
Each router stores a table of which networks are directly connected and how to get to the networks that are not. Data from the session layer are assembled into packets at this layer. UDP is lightweight. Why is UDP used at all? Unlike TCP. UDP can be used for applications where speed and bandwidth are a concern. In some cases. This means that applications using UDP must be responsible for their own reliability. Table Network Layer The role of the network layer is to determine the best path or route for data to take from one network to another.
Because networks need some way of identifying themselves. Since it does not have to initiate a connection using a three-way handshake.
In other words. Binary is written out in decimal to make it easier to read and understand. If it is not. IP addressing is covered in more detail in Chapter 3 of this study guide. When a packet arrives at a router interface. Frames are then transported across a physical medium i.
This address identifies both the manufacturer of the device and the specific host. While the network layer determines where networks are located. This is where the physical address of the interface or device is stored.
A MAC address is a bit address expressed as 12 hexadecimal digits. The data link layer has its own way of addressing known as hardware addressing. In Figure 1. Switches and bridges operate at the data link layer of the OSI model. The next three bytes are assigned by the vendor and must be unique in order to prevent the same address from being used twice. The reason why protocols operate at the data link layer is twofold.
A table of MAC addresses and which port they are connected to is maintained by both devices. Hubs operate at the physical layer of the OSI model. The MAC address allows devices to have a unique layer 2 address and allows communication to take place at layer 2.
Data Link Protocols There are many protocols operating at the data link layer. The physical layer has to use bits binary digits since data on a wire can be sent only as a pulse of electricity or light—that is. Physical layer specifications include IEEE Frame Relay. Protocols are an agreed format through which devices in a network communicate with one another.
Hubs take the bits. Some shady manufacturers do not follow these rules. Physical Layer The physical layer takes frames from the data link layer and converts them into bits. Because you are using packets at the network layer and frames at the data link layer. The physical layer deals with the physical characteristics of the medium. We will address those pertinent to the CCNA exam in the relevant chapters. Data Link Frame physical connection.
A thorough knowledge of the OSI model is vital for the exam. POP3 6 Compression. Know each level and encapsulation formats and which device sits where.
Pearson Prentice Hall. Rick McDonald. The lowest TCP layer can be referred to as the physical layer. POP3 — used to provide e-mail services Technet Protocols and Architecture Various protocols can be used in this layer.
ISBN RFCs are Requests for Comments. Network Fundamentals: Each segment contains a number of fields that carry different information about the data as shown in Figure 1. UDP does not check the segments that arrive at the destination to ensure that they are valid and in the proper order.
On the other hand. The transport layer is based on two protocols: TCP — This provides connection-oriented communication. An example would be your web browser requesting HTTP services from the network. The application layer would provide the interface for this to take place. In fact. UDP — This provides unreliable. This means that the integrity verifications and the error connection process will occur in the application layer. This means the path that data travels on in the network is reliable.
Every data packet is acknowledged by the receiving host and includes a Checksum field to check for error detection. Confusingly for many students. Port numbers are used to distinguish between applications running on the same device. Port numbers through are registered port numbers and the range through defines dynamic port numbers automatically assigned by network devices. Port numbers can take values up to Examples of well- known port numbers include: Most of the common applications are assigned well-known port numbers.
Host B sends a new segment with the FIN bit set. Host A has a window size of 2 and Host B has a window size of 3. The acknowledgment number represents the next segment it expects to receive. Host B accepts. In the example depicted above. The last step before the session is closed is Host A sending an ACK segment number to confirm that it received number from Host B.
This layer is responsible for routing data. Host B acknowledges the request and sets the ACK bit to acknowledgment number to confirm that it received number The segment includes the sequence number Host B is using at that specific moment in this example. Host A replies with an ACK segment that contains sequence number 6. The segment also includes the current sequence number of Host B in this example.
Host A sends a segment with the FIN bit set. IP Internet Protocol — This connectionless protocol offers best-effort delivery of packets in the network. The new segment includes the initial sequence number from Host B. The window sizes may not match on the two endpoints. The segment includes the initial sequence number 5 that Host A is using. It relies on transport layer protocols like TCP to.
When Host A sends data. This concludes the TCP session establishment phase. The window size specifies the number of bytes octets a device will accept.
Host B can send only 2 bytes before receiving an ACK. After all the data is sent between the two hosts. Host A sends a segment with the SYN bit set. The window size informs the remote host about the number of bytes a device will accept before it must send an acknowledgment. The most-used application that relies on ICMP is ping.
As mentioned. IP addresses are assigned to each network device or interface in the network. An IPv4 packet. IP comes in two flavors: IPv4 and IPv6. We will look at ICMP in more detail shortly. These aspects will be covered in detail later in this book. The course will give you a very thorough understanding of TCP and the mechanics of internetworking. There are a number of protocols available.
We will revisit TTL later. Note that this facility is unavailable for Ethernet frames.
If the number reaches zero the packet will be discarded to prevent packets from endlessly circulating the network. Having said this. An IPv6 packet contains the following fields: As the packet traverses each router. We will mention some of these fields below and later in this guide as they become relevant.
UDP We will cover binary math in the IP addressing chapter. The Protocol field is populated with the protocol number. The Version field in the packet identifies the IP version. OSPF The host with that IP address responds with its MAC address and the sender caches this in its memory for a period of time.
Once the MAC address is known. More details will be provided on this subject in the IPv6 addressing chapter. To ensure reliability. Debugs are Cisco troubleshooting tools that display information you can use to troubleshoot various protocols and services. A control connection is made from the client to the FTP server on port Trivial File Transfer Protocol Technet On Cisco devices the debug ip ftp command can be used to debug FTP traffic that is destined to the device.
File Transfer Protocol FTP is an application layer protocol that is used to reliably transfer files from a source to a destination. We will discuss debugs later in this guide because they will be an important part of your troubleshooting tool bag. This works by sending a broadcast message to all the hosts on a subnet and asking for the MAC address of the host that has the IP address. To disconnect from a Telnet session.
One of the protocols for e-mail retrieval is POP3. E-mails can be retrieved from an SMTP server in different ways depending on the e-mail client. To set up Telnet on a Cisco router. TFTP can be used to backup and copy router configurations.
If you are using a server. For secure communication. To break out of a Telnet session. Traffic sent using Telnet is in clear text so it is insecure. When using TFTP. On Cisco devices. Telnet Telnet is used for remote connections to network devices and it operates on TCP port You will need a TFTP client which can be the router and a TFTP service which can be either another router that has the files stored locally or a server in the network to accomplish this task.
We will use the telnet command several times throughout this guide. A Cisco router or switch can be connected to via a web browser. Troubleshooting Tip: Telnet is a good utility to validate that the seven layers of the OSI model are working correctly.
SSH is often used for remote command executions. The underlying security features and the fact that it can work with an SSH connection make it preferable in secure environments. It uses port 22 as does SSH. TLS ensures privacy between application users such as e-mails by preventing tampering or eavesdropping. Internet Control Message Protocol As mentioned earlier. When a ping command is issued. This is called a denial-of-service DoS attack. If the packet makes it successfully to the destination.
Approximate round-trip times in milli-seconds: It is also used for diagnostic and control purposes. You can see that the reply is 32 bytes long. When a packet Technet The most common use of ICMP is the ping command to test connectivity between two devices. Other information can be derived from a ping. An example of a ping command and output on a Windows machine is shown below: Reply from When there is an error in an IP message in the network. TTL is the value that tells you how many hops or devices are between the source and destination devices.
Type escape sequence to abort. You can access this feature by typing ping and pressing Enter as shown below: In this case. If the TTL gets to 0. Datagram size : Extended commands [n]: Type of service : Set DF bit in IP header? Sending 5. Please remember this difference for the exam. At each hop. Learning all of the code numbers and names is outside the scope of the CCNA syllabus check before you take your exam though. Cisco routers and all other UNIX-based devices use the traceroute command.
You can debug ICMP traffic sourced from or destined to a Cisco router with the debug ip icmp command. Traceroute Traceroute is another widely utilized ICMP utility that is used to determine the path that a packet will take to reach its destination. The sender of these time-exceeded packets is displayed to the user the hops taken to reach the destination. The host with the relevant IP address responds with its MAC address and layer 2 communication can then begin.
At layer 3. NET [ To communicate with hosts in the same network. This request is a broadcast and all the hosts in the network segment receive it. When a host needs to communicate with another host. On Ethernet networks. Address Resolution Protocol Different addressing formats are used to identify network hosts at various layers of the OSI model. The fields in the traceroute output are the same as those for the ping responses earlier. Here is the configuration I added to Router 1.
For a simple check of the ARP process. R1 show arp Technet On Router 2. Add the IP addresses of course. I can issue a show arp command to check the ARP cache. When I issue the ping Bear in mind that several devices could be on this segment of the network.
I have added The Destination field is unknown so it is set to be a broadcast. If for any reason you wanted to flush the ARP table on the router.
The dash after These seemingly insignificant details are very important to note for the exam. If you need to send packets to R2 again. If the entry was learned less than one minute ago. The ARP table will eventually clear if no traffic is sent to R2. The MAC address for Bear in mind that network hosts will usually store the IP address and MAC address for the default gateway. Proxy ARP is turned on in Cisco routers by default.
Proxy ARP is a hot exam topic. Since routers do not forward broadcasts. This allows the sending host to encapsulate the layer 2 Destination field in the packet.
To facilitate communication. This mechanism is defined in RFC The only time you will see the layer 3 address change is if NAT is in place. The layer 3 address is known but not the layer 2 address. When R1 wants to send a packet to R3. Please add all the IP addresses as per Figure 1. You will learn how NAT works in a later chapter. Proxy ARP There are two networks here. The layer 3 address can never change as the packet traverses the network. After adding the IP addresses. The delay causes the first few ping packets to fail due to a timeout indicated by the.
R1 ping Sending R2 will then swap the destination MAC address for the correct one attached to the R3 interface. You can see the ARP request from R1 in the packet capture below.
This allows R1 to address the packet and send it. Here is how I did it on R3: If you found that the configurations above were a little hard to follow. The MAC address will have to change from hop to hop though. Please also bear in mind that you issue a show arp command on a router but on Windows PCs the command is arp —a. You can see an example of this in Figure 1.
GARP is used if a device wants to check whether a certain IP address is already in use in the network. Gratuitous ARP On occasion e. If a response is received. A typical use for this protocol is thin clients obtaining their IP addresses from servers when they are booting up. This allows you to enter www. You can debug SNMP traffic with the debug snmp command.
If the IP address Technet A network device can also send messages called traps to a management station to inform it of events such as high CPU usage. Please add the IP addresses as per Figure 1. Mini-lab — Pinging Hostnames As hostnames are much easier to remember than a long list of IP addresses. If you are using a home network. If you are using DHCP on your network. See the mini-lab below for more information.
Type the command below on Router A: RouterA config ip name-server To do this you need to use the ip name-server [server-address 1] [server-address 2] command. Type out the following on your router: RouterA tggt Translating tggt. RouterA config ip host RouterB If the router does not know what the hostname is. This can be very frustrating because you have to wait for several seconds Technet Current configuration: The output of a show run command on my router shows which commands are on by default: RouterA sh run Building configuration.
You can disable name resolution using the no ip domain-lookup command: You could. This is for internal network management only the management plane. Just like above. You will need access to a public DNS server to get this to work.. Router config ip name-server 4. Router config ip dns server That is it! Now clients can use the router as a DNS server.
Router config ip domain-lookup Next. But what if you need the router to resolve an internal address? You can now add DNS records directly on the router: Router config ip host server1. The previous scenario was for demonstration purposes and should be avoided when possible. There is a large amount of information to learn about DNS server hierarchy and zone transfers.
You can debug DNS traffic with the debug domain command. Cisco Discovery Protocol CDP is a Cisco proprietary protocol designed to collect information about neighboring network devices.
CDP is on by default on Cisco devices. For IPv4 they are known as A records made from 32 bits. A router is meant to route packets and that is what it does best. One difference. Because of its always-on feature.
CDP has always been an exam favorite. For these reasons. Of course. Trans Bridge. Please add the IP addresses to the relevant interfaces. Source Route Bridge. R1 show cdp Global CDP information: R1 show cdp nei Capability Codes: Capability Codes: It was originally developed by Bob Metcalfe in while he was working at Xerox. R1 show cdp neighbors detail Device ID: Ethernet networking is actually a group or family of networking technologies. Port ID outgoing port: Cisco IOS Software.
Version IP address: With these commands you can quickly work out the physical topology. Cisco In order to control all the traffic. The sending device listens to discover whether a collision has occurred. It was quickly discovered that frames would often collide on the wire. No signal means that it is clear to send the frame. The very first implementation of Ethernet networking used coaxial cables. If there was a collision. A random timer runs and no frames can be sent by the original devices until it Technet Ethernet is known as a contention-based access method.
The frame is put onto the wire. This ensures that when a network interface card NIC wants to transmit data. Carrier sense — checks the cable to ensure that it is not in use signal on the wire Transmit if quiet — sends the frame if the line is clear Collision — both frames are destroyed if they collide on the wire. The The device wanting to transmit a frame listens for a carrier signal on the wire. It works in much the same way as a formal board meeting. The device starts back at step 1.
Half-duplex is a technology that originally ran on coaxial cables. We will cover this situation in the troubleshooting section. Because a wire is not needed to listen for collisions. This works in the same way as walkie-talkies: This method is still used today if there are hubs in the network. Duplex Settings The traditional method for Ethernet to operate was to use half-duplex mode.
This is achieved by using UTP cables which we will cover later. Full-duplex mode allows the host to send and receive frames at the same time. Despite this fact. Cisco wants you to understand this concept for the exam. A very large amount of late collisions showing up on your Ethernet interface is a sure sign of duplex mismatch settings on your Ethernet ports.
This made configuring devices.
As the network administrator. Autonegotiation uses fast link pulses FLPs to allow the devices to agree to send data at the highest available rate. You are bound to encounter autonegotation issues in the real world at some point and possibly in Technet Autonegotiation Network engineers originally had to determine which devices could transmit at 10 or Mbps. These are theoretical speeds that are dependent on other factors. Mini-lab — Configuring Ethernet Speed and Duplex Settings You should configure speed and duplex settings on a router Fast Ethernet interface rather than let it autonegotiate.
Your default settings may differ from mine and your interface name may also differ. Loopback not set Keepalive set 10 sec Half-duplex. R1 config-if duplex?
Loopback not set Keepalive set 10 sec Technet Ethernet Ethernet has four different frame types available. They have been improved on over the years but some have become obsolete. If the data was encapsulated with layer 3 information. Ethernet II The If you had the interface operating at half-duplex. LAN data encapsulated at layer 2 is referred to as frames.
If you inspected the data it would be encapsulated with a layer 2 header and trailer. Multicast one-to-many — a subset of all devices are the recipients Technet Unicast one-to-one — a single LAN interface is the recipient 2.
Destination Address — destination MAC address. Broadcast one-to-all — all devices on the LAN are the recipients 3. If there was no interface associated with the frame. The switch forwards a unicast frame out of the interface the destination address is associated with. A broadcast frame appears as FF: FF in hexadecimal.
In the output below. All hosts receive the broadcast frame and they must use CPU resources to check the destination frame to see whether it is the intended recipient.
Multicast Multicast traffic is transmitted from a host and listened for by a subset of hosts in the network. A switch will forward a broadcast frame out of all interfaces except the interface the frame was received on. A switch will forward a multicast in the same way that it forwards a unicast frame with an unknown destination port. Paul Browning. Ramon Nastase. Paul then started his IT consultancy and training company, Networks, Inc. Since , Paul has written several best-selling IT books and has trained thousands of students through his classroom and web-based IT courses.
Product details File Size: Reality Press Ltd. May 3, Sold by: English ASIN: Enabled X-Ray: Not Enabled. Is this feature helpful? Thank you for your feedback. Share your thoughts with other customers. Write a customer review. Customer images. See all customer images. Read reviews that mention easy to read ccna exam study guide easy to understand highly recommend paul browning well written real world kindle version ccna simplified cisco ccna paul and his team recommend this book great book ccna in 60 days great study book to anyone best way straight to the point read and understand.
Top Reviews Most recent Top Reviews. There was a problem filtering reviews right now. Please try again later. Kindle Edition Verified Purchase. Short answer: This book is excellent. Long answer: This book is extremely thorough. As far as I can tell, nothing has been left to chance.
The format of the book is designed to gradually break you into the concepts, culminating in each chapter using the material from the previous ones. You will need a homelab or GNS3 to utilize the every lab in the book, but that's expected and I encourage you to invest in good hardware. Don't forget to take the online exams that are linked in the book at the end of each chapter! Browning and his colleagues never fail to impress or deliver. This will be my third CCNA re-certification, and his publications make it easier every time.
I utilized the Cisco Press series for my first certification and it too me nearly a year. For my re-cert, I used Mr. His ability to combine knowledge of the current state of the exam along with practical application not only cuts out the "fluff" found in other publications, but also relies heavy on lab experience and theoretical knowledge.
He immediately gets to the the "meat and potatoes" of exam content and delivers it in an all-encompassing yet easily accessible format. With all of the different methods in use for Cisco Certification learning, it is quite reassuring to know that I will be able to utilize Mr. Browning's publications and all of the many other resources he provides as I work my way up to a CCIE.
An excellent, one-stop resource for studying for your CCNA. Each chapter contains a helpful syllabus at the beginning, access to an exam that you can use to make sure the material has "sunk in," and labs with clear cut objectives. The writing is straightforward and easy to understand with helpful graphics along the way.
I would highly recommend this book to anyone studying for their CCNA. Paperback Verified Purchase. I bought this book by doing an extensive researching online. As you may know, there are a lot of study book guides out there. I have to tell you something. I have 0 work field experience. Then, I started reading every day. What I read every day is more than enough to understating every basic and advance details and information on every content on it.
This book is easy to follow and it has a very interesting study method. Every page you read you will get more familiar and confident with any topic on the book. I made my best option on getting this book for sure. Browning and his associates. I've been very happy with this book. You can tell it's written by people who work in the industry and I've learned a lot of new things while reviewing for the exam. I've used other Cisco books to study before, but never felt ready to take the exam.
With this book I do. Don't use this as your only study resource, but this would be a great start for your CCNA exams. Like it Bob Seger in his song Like a rock, "Twenty years now. Where'd they go? The book renders well on Kindle Fire except for some of the bulleted list and some examples like packet details doesn't flow well with the rest of normal text.
It's hard to tell when normal and packet examples are separated. I gave it 4 stars because it's a great book to prepare for an exam. Author will even send more stuff if you review the book. Nothing can prepare you for real life jobs, but this is the best way to try and prepare. I have not read the book in its entirety yet, but if you follow the suggestions of the writer, you don't want to just sit and read the study material cover to cover.